About your Search

20130416
20130424
Search Results 0 to 5 of about 6
. our efforts mandate investments in the people, processes, and technology, not just technology, people, processes, and technology. completed training to improve the quality and productivity of claims. more are being trained, and for the new employees at complete more claims per day in their predecessors. use of visibility benefits and questionnaires. online forms for submitting medical evidence has dropped average processing time as a medical exams and improved accuracy. there are now three lines for processing claims, an express line for those that will predictably take less time, a special operations lane for unusual cases or those requiring special handling, and a core lane with roughly 60 percent of the claims, and that is the remainder. technology is critical, and in the backlog. our paperless processing system, veterans benefits management system will be faster and improve access, live automation, and reduce aryans. thirty regional offices now use this. of 56 will have it by the end of this year. homelessness, the last of our three particles, to end veterans homelessness in 2015.
effective defense of attribute may not be all of its radars and sensors and missiles and stealth technology and ability to fly it synthesized speech. it might well be the way it was designed to avoid budget cutters in washington. >> now a hearing on the justice department's 2014 budget request. attorney general eric holder testified before how supra-patient subcommittee for a little more than two hours. be attorney general holder we welcome you to the committee and thank you for appearing. i'm going to hold my questions until the very end because members have to catch planes and go out of town but i will have an opening statement to cover questions and concerns that i have. let me address the bombing attack at the boston marathon on monday. we know the fbi and the joint terrorist task force batf and its forensic specialists in all the federal state and local authorities are working nonstop to determine who carried out this barbaric act. let me assure you the subcommittee is ready to help in any way we can to help law enforcement against perpetrators and planners of this act of terror and in
and can only respond to known threats. cyberthreats evolve at the speefed technology and this measure helps the private sector protect against cyberattacks by providing companies with the latest cyberthreat information from the intelligence community which has timely classified information about destructive malware. this cyberthreat intelligence is the information that companies and the government need to protect and defend their networks. the so-called signatures are primarily made up of numerical codes consisting of zeros and ones without any perm information attached. -- any personal information atammed. cispa is a result of cooperation between the community, companies and to a certain degree the white house as it pertains to many measures included in this legislation. during their efforts to improve the bill, they also maintain a dialogue with privacy advocates in an effort to strengthen civil liberties, protections and oversights. i had a personal note here for the reason that over a period of 10 years i served eight of those years on the intelligence committee. and the now chair
and the military side. i've constantly tried to improve how we address the need for the next generation technology, public-private cooperation and ensuring that we have the price personnel to counter this 21st century cyberthreat. however, i am uncompromising in safeguarding the rights of our citizens and i will never sacrifice our civil liberties for unneeded intrusion. to this end, the amendment i am offering today would strengthen existing provisions in the bill to include the privacy officer and the officer for civil rights and civil liberties of the department of homeland security askey stakeholders in the report that would a-- as key stakeholders in the report. this report would assess how this legislation affected our civil liberties and privacy throughout our federal government, and the department of homeland security is the -- the key civil department in our federal government that develops and implements cybersecurity protocalls for the rest of the -- protocols for the rest of the federal government. it is crucial that they be part of any assessment and work with both the privacy office
of their own people and continue to develop technology it is a matter of time before they have technology to reach us. do you agree with that? >> probably so. if they keep working at it and they have a single-minded focus focus, particularly the current leader may be more intensely than his father i think feels that is the key to their survival. >> i think that is a good honest assessment put them in the bucket of threats that the nation faces a capable of north korea with larger missiles and probably smaller bombs producing that is a reasonable threat we should plan against if nothing changes? >> i do blie that. >> syria. to give enough chemical weapons to kill thousands? >> potentially yes and that is very dependent on lots of things are the number of casualties that could be incurred in favor employee. >> but they have a lot that could killltofpele >> correct. that's another step. over the last six months as we are imposing sanctions and negotiating through the regime do they have more or less enriched uranium? >> we will get you the exact numbers enclosed context. >> can i say it is m
of this implementation was really to create information and technology exchanges in every part of the country. and they are focusing most specifically on critical access, hospitals and on small providers. knowing that the l to have a big i.t. department or have people who could implement this in a sfiio of time were not there. so in every state there are individuals who are sort of, i compared them to the farm extension services, folks were on the ground literally, office to office, hospital to hospital, spend time on how to convert what the best strategies are, how did engaged and involved. and we found at least in a state like kansas, which is not terribly different from the challenges i think that you see in your state, that that strategy has been enormously effective. and small providers are engaged and enrolled with those extensions operations, and find them to be kind of their service team on the ground. >> the only thing i would say, i hope that as we move forward with this, that the focus really will be on issue of interoperability we've asked questions numerous time of the committee
Search Results 0 to 5 of about 6